all InfoSec news
Topic: theory
EASIT: 2024 IEEE East Asian School of Information Theory
3 weeks, 4 days ago |
www.iacr.org
Local Approximation of Secrecy Capacity
4 weeks, 2 days ago |
arxiv.org
Robustness Bounds on the Successful Adversarial Examples: Theory and Practice
1 month, 2 weeks ago |
arxiv.org
On efficient normal bases over binary fields
2 months ago |
arxiv.org
Formal Verification of the Sumcheck Protocol
2 months, 1 week ago |
arxiv.org
Efficient $(3,3)$-isogenies on fast Kummer surfaces
2 months, 2 weeks ago |
arxiv.org
How does it happen in an enterprise: Vulnerability management
2 months, 2 weeks ago |
www.reddit.com
Efficient (3,3)-isogenies on fast Kummer surfaces
2 months, 2 weeks ago |
www.iacr.org
Does CVSS 4.0 solve the exploitability problem?
2 months, 2 weeks ago |
www.helpnetsecurity.com
TCC 2024: Theory of Cryptography Conference
2 months, 3 weeks ago |
www.iacr.org
FiveEyes: Cryptographic Biometric Authentication from the Iris
2 months, 3 weeks ago |
www.iacr.org
Navigating Zero Trust in the Cloud: Challenges vs. Solutions
2 months, 3 weeks ago |
securityboulevard.com
Short Code-based One-out-of-Many Proofs and Applications
2 months, 4 weeks ago |
www.iacr.org
Combinatorially Homomorphic Encryption
3 months, 2 weeks ago |
www.iacr.org
The Planck Constant and Quantum Fourier Transformation
3 months, 2 weeks ago |
www.iacr.org
Reddit research ops bribing mods to install chrome browser
4 months, 2 weeks ago |
www.reddit.com
Postdoc in post-quantum cryptography
4 months, 3 weeks ago |
www.iacr.org
Do you keep track of changes to open source projects you use?
4 months, 3 weeks ago |
www.reddit.com
Construction-D lattice from Garcia-Stichtenoth tower code
5 months, 1 week ago |
www.iacr.org
Items published with this topic over the last 90 days.
Latest
EASIT: 2024 IEEE East Asian School of Information Theory
3 weeks, 4 days ago |
www.iacr.org
Local Approximation of Secrecy Capacity
4 weeks, 2 days ago |
arxiv.org
Robustness Bounds on the Successful Adversarial Examples: Theory and Practice
1 month, 2 weeks ago |
arxiv.org
On efficient normal bases over binary fields
2 months ago |
arxiv.org
Formal Verification of the Sumcheck Protocol
2 months, 1 week ago |
arxiv.org
Efficient $(3,3)$-isogenies on fast Kummer surfaces
2 months, 2 weeks ago |
arxiv.org
How does it happen in an enterprise: Vulnerability management
2 months, 2 weeks ago |
www.reddit.com
Efficient (3,3)-isogenies on fast Kummer surfaces
2 months, 2 weeks ago |
www.iacr.org
Does CVSS 4.0 solve the exploitability problem?
2 months, 2 weeks ago |
www.helpnetsecurity.com
TCC 2024: Theory of Cryptography Conference
2 months, 3 weeks ago |
www.iacr.org
FiveEyes: Cryptographic Biometric Authentication from the Iris
2 months, 3 weeks ago |
www.iacr.org
Navigating Zero Trust in the Cloud: Challenges vs. Solutions
2 months, 3 weeks ago |
securityboulevard.com
Short Code-based One-out-of-Many Proofs and Applications
2 months, 4 weeks ago |
www.iacr.org
Combinatorially Homomorphic Encryption
3 months, 2 weeks ago |
www.iacr.org
The Planck Constant and Quantum Fourier Transformation
3 months, 2 weeks ago |
www.iacr.org
Reddit research ops bribing mods to install chrome browser
4 months, 2 weeks ago |
www.reddit.com
Postdoc in post-quantum cryptography
4 months, 3 weeks ago |
www.iacr.org
Do you keep track of changes to open source projects you use?
4 months, 3 weeks ago |
www.reddit.com
Construction-D lattice from Garcia-Stichtenoth tower code
5 months, 1 week ago |
www.iacr.org
Topic trend (last 90 days)
Top (last 7 days)
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Information Security Engineers
@ D. E. Shaw Research | New York City
Network Security Engineer
@ Ørsted | Kuala Lumpur, MY
Senior Director of Foundation Relations, Johns Hopkins University & Medicine
@ Johns Hopkins University | Baltimore, MD, United States, 21209
Global Cybersecurity Head
@ CMA CGM | Marseille, FR
Cyber Security Analyst
@ QinetiQ US | Reston, VA, United States